Industrial Training in Chandigarh


CNT TECHNOLOGIES provide Industrial Training for students of B.Tech, Diploma, MCA , as it is very helpful in the developments of professional and technical skills of the students and give them the practical knowledge on various Projects and Programming languages. We provide such Practical Training to the Students which helps them to involve in the competitive World for their bright future


IT Security & Ethical Hacking

  • Protocols and Available Vulnerabilities
  • Introduction to Ethical Hacking
  • Internet Threats Available
  • Countermeasures against Cyber Threats
  • Information Gathering Techniques
  • Social Networking and Privacy Issues
  • Google Hacking Hackers Best Friend
  • Firewall and Honeypots
  • Becoming Anonymous on Cyber Space
  • Fake Electronic Mail
  • Email Hacking and Countermeasures
  • Social Engineering / Get Smart in Cyber World
  • Introduction to Cryptography / Encryption
  • Steganography Art of Hiding Secret data
  • Introduction to Virtual Machine Concepts
  • Network and Information Security
  • System Security and Vulnerability Patching
  • Virus and Worms Attacks
  • Introduction to Sniffing and Wireless Security
  • Website Hacking and Countermeasures
  • Cyber Laws in India
  • Underground Hacking World
  • Hacking Communities all around the world
  • A Small Guide to Networking
  • Black and White Box Information Gathering
  • Advance Google Hacking
  • Trojan and RATing Attacks
  • Binders and Cryptors
  • Firewall Policy implementations at Corporate Level
  • Spamming Attacks
  • Advance Email Hacking Techniques
  • Introduction to Backtrack Operating System R1
  • Protocols Vulnerabilities and Exploiting through Sniffers
  • Steganography Terrorist Love
  • Website Hacking Techniques and Countermeasures
  • Virus - Worm -Zombies in Depth
  • Digital Forensics
  • Buffer Overflow Attacks
  • Be Anonymous in Cyber World VPN and Proxy Servers
  • Hacking Mobile Phone Operating Systems Available
  • Cyber Law in India and Abroad
  • Network Security & Information Security
  • Exploit Writing
  • Exploiting With Metasploit Framework 4.0
  • Session Hijacking with Android Applications
  • Denial of Services Attacks
  • A Close eye on Cryptography and RSA
  • Hacking Home routers and Countermeasures
  • USB Hacking Technique / Switch blades
  • Social Engineering
  • Understanding ATM Security
  • Introduction to Penetration testing
  • Penetration Operating Systems available
  • Installing Backtrack 5 R1 on HDD
  • Virtual Machine Concept and Limitations
  • Networking Basics and Protocol Analyzing
  • Exploring Tools in Backtrack 5 R1
  • Information Gathering Techniques in Depth
  • Infrastructure Fingerprinting Web servers
  • Fingerprinting Framework and Applications
  • Enumerating Resources available
  • Web Server misconfiguration Vulnerabilities
  • Google Hacking
  • Metasploit Framework 4.0
  • Social Engineering Toolkit
  • Vulnerability Assessment VS Penetration testing
  • Finding Vulnerabilities with Nessus Tool
  • Introduction to Nikto
  • Cross Site Scripting Attacks
  • SQL Injection
  • Advance Web Attacks
  • Firewall Implementation and Policy Making
  • Network Security Testing in Depth
  • Browsing anonymously
  • Tunneling for anonymity
  • Cleaning traces
  • Social Engineering types
  • Social Networking Backbone of Social Engineering
  • Cryptography and Password Cracking
  • Buffer Overflow Attacks
  • Introduction to Rootkit
  • Wireless Attacks Penetration Testing

REGISTER HERE